LogoLogo
  • Getting Started
    • Welcome to Teleskope.ai
    • Your Journey with Teleskope
  • The Platform
    • Data Catalog
    • Data Subject Rights
      • Integrations
      • Enroll Third Party Integrations
        • Amplitude
        • Google Analytics
        • Salesforce
        • Bazaar Voice
      • Enroll Structured Databases
      • Deletion Methods
    • Policy Maker
    • Issues
    • API Service
      • Scanning API
        • v1/classify
        • v1/classifyCollection
        • v1/scan
      • Redaction API
        • v1/scrub
      • Data Subject Rights
        • GET v1/dsr/requests
        • POST v1/dsr/requests
      • Metadata
        • v1/aws/rds
        • v1/aws/s3
        • v1/snowflake
        • v1/snowflake/users
        • v1/gcp/bigquery
        • v1/gcp/cloudstorage
        • v1/gcp/cloudsql
  • Setup
    • Deployment
    • Role Based Access Control
    • SSO
      • Okta
      • Microsoft Entra
      • Google Auth
  • Specifications
    • Data Store Coverage
    • Compliance Frameworks
    • Redaction Methodologies
    • Data Elements
  • Connectors
    • AWS
      • Athena
      • RDS
      • DynamoDB
      • Redshift
      • S3
      • SNS
      • SQS
    • GCP
      • Cloud Storage
      • Grant Teleskope Access to BigQuery
      • CloudSQL
      • Grant Teleskope Access to CloudLogging
    • SaaS
      • Github
      • Google Drive
      • Jira
      • Segment
      • Zendesk
      • DropBox
      • Box
      • Bitbucket
      • Slack
      • Sharepoint Online
    • Snowflake
    • Azure
      • Azure SQL
      • Azure Database
      • Blob Storage
      • CosmosDB
      • Synapse
    • Databricks
  • DSR
  • Alerting Integrations
    • Slack
    • Tines
Powered by GitBook
On this page
  • Setup
  • Provisioning

Was this helpful?

  1. Setup
  2. SSO

Microsoft Entra

PreviousOktaNextGoogle Auth

Last updated 2 months ago

Was this helpful?

To rely on Entra for SSO, you need to register an application in your tenant and provide Teleskope a Client Id, Client Secret, and your Tenant ID.

Setup

  1. Navigate to and sign into your enterprise's Microsoft dashboard

  2. Select Overview from the sidebar.

    1. Collect your Tenant ID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

  3. On your side bar, select Applications, then App registrations

  4. Select New registration, and name your Teleskope SSO app.

    1. There will be a few authentication options, we recommend Accounts in this organizational directory only (Single tenant) as the simplest option

  5. On your side bar, select Applications, App registrations, then select your newly created app.

    1. Collect your Application (client) ID

  6. In your app's registration page, under Certificates & Secrets, select New client secret. Set a name and expiry

    1. Collect the resulting value as your client_secret .

  7. In your app's registration page, select API Permissions and click Add a Permission.

    1. Set up delegated permissions for Microsoft Graph, admin consent not required. You will need the email, openid and profile permissions set.

  8. In your app's registration page, select Manifest and change accessTokenAcceptedVersion to 2 within the corresponding json manifest

  9. In your app's registration page, select Authentication, + Add a Platform, Web, then enter your Redirect URI:

    1. Example: https://teleskope-provided-uri/auth/microsoft/callback

Provisioning

  1. Assign users to your new Teleskope Entra app.

  2. A first/last name in Entra is required for any user logging into Teleskope.

https://entra.microsoft.com/